A survey of secure mobile ad hoc routing protocols
L Abusalah, A Khokhar… - … communications surveys & …, 2009 - ieeexplore.ieee.org
Several routing protocols have been proposed in recent years for possible deployment of
mobile ad hoc networks (MANETs) in military, government and commercial applications. In …
mobile ad hoc networks (MANETs) in military, government and commercial applications. In …
Securing ad hoc networks
Ad hoc networks are a new wireless networking paradigm for mobile hosts. Unlike traditional
mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead …
mobile wireless networks, ad hoc networks do not rely on any fixed infrastructure. Instead …
VeRA-version number and rank authentication in RPL
Designing a routing protocol for large low-power and lossy networks (LLNs), consisting of
thousands of constrained nodes and unreliable links, presents new challenges. The IPv6 …
thousands of constrained nodes and unreliable links, presents new challenges. The IPv6 …
[KSIĄŻKA][B] The handbook of ad hoc wireless networks
M Ilyas, BC Seet, X Hannan, YC Tseng, A Mishra… - 2017 - taylorfrancis.com
A relative newcomer to the field of wireless communications, ad hoc networking is growing
quickly, both in its importance and its applications. With rapid advances in hardware …
quickly, both in its importance and its applications. With rapid advances in hardware …
[PDF][PDF] Wireless ad-hoc networks
L Han - Wireless Personal Communication Journal of mobile …, 2004 - cs.rutgers.edu
Abstract Deployed in 1990's, Mobile Ad-hoc networks have been widely researched for
many years. Mobile Ad-hoc Networks are a collection of two or more devices equipped with …
many years. Mobile Ad-hoc Networks are a collection of two or more devices equipped with …
Physical access control
S Micali, D Engberg, P Libin, L Reyzin… - US Patent …, 2008 - Google Patents
Provisional application No. 60/370,867, filed on Apr. 8, 2002, provisional application No.
60/372,951, filed on Apr. 16, 2002, provisional application No. 60/373, 218, filed on Apr. 17 …
60/372,951, filed on Apr. 16, 2002, provisional application No. 60/373, 218, filed on Apr. 17 …
Security in wireless ad hoc networks
A Mishra, KM Nadkarni - The handbook of ad hoc wireless networks, 2003 - dl.acm.org
The realm of wireless ad hoc networks is a relatively new one, even with advancement in
wireless networks in general. Essentially, these are networks that do not have an underlying …
wireless networks in general. Essentially, these are networks that do not have an underlying …
Efficient certificate revocation
S Micali - US Patent 7,337,315, 2008 - Google Patents
US7337315B2 - Efficient certificate revocation - Google Patents US7337315B2 - Efficient
certificate revocation - Google Patents Efficient certificate revocation Download PDF Info …
certificate revocation - Google Patents Efficient certificate revocation Download PDF Info …
Highly secure and efficient routing
I Avramopoulos, H Kobayashi, R Wang… - IEEE INFOCOM …, 2004 - ieeexplore.ieee.org
In this paper, we consider the problem of routing in an adversarial environment, where a
sophisticated adversary has penetrated arbitrary parts of the routing infrastructure and …
sophisticated adversary has penetrated arbitrary parts of the routing infrastructure and …
Controlling access to an area
P Libin, S Micali, D Engberg - US Patent 7,822,989, 2010 - Google Patents
Controlling access includes providing a barrier to access that includes a controller that
selectively allows access, at least one administration entity generating credentials/proofs …
selectively allows access, at least one administration entity generating credentials/proofs …